Feeds

16-card GPU bangs-per-buck mega shoot out

We name the best GPUs for performance and price

Business security measures using SSL

So here’s what we have done. We’ve taken almost all of the graphics cards that we used in the Nvidia GeForce GTX 280 and AMD Radeon HD 4850/4870 reviews with the exception of cards like the PowerColor HD 2900 XT 1GB which we can't find it on sale today. Using price-comparison and retail sites lile PriceGrabber and Scan, we’ve found typical over-the-counter prices for the graphics cards. We’re not too hung up on the exact make and model, instead looking for a price that's representative of the graphics chip, clock speed and type of memory.

The first chart (below) shows the graphics cards in order of performance with dual Radeon HD 4850 in CrossFire at the top closely followed by GeForce 9800GX2, HD 3850 X2, GeForce GTX 280 and Radeon HD 4870 a distance behind. If we'd used high quality image settings for 3DMark06 that used anti-aliasing, you can bet the order would have shuffled around but we are sure that the same cards would have been at the top of the pile.

Reg Bangs Per Buck Chart

Longer bars are better

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.